L3VPN Working Group Eric C. Rosen (editor)
Internet Draft Cisco Systems, Inc.
Intended Status: Proposed Standard
Expires: August 9, 2012 Yakov Rekhter (editor)
Updates RFC 6514 Juniper Networks, Inc.
Wim Hendrickx
Alcatel-Lucent
Ray Qiu
Huawei
February 9, 2012
Wildcards in Multicast VPN Auto-Discovery Routes
draft-ietf-l3vpn-mvpn-wildcards-02.txt
Abstract
In "Multicast Virtual Private Networks" (MVPNs), customer multicast
flows are carried in "tunnels" through a service provider's network.
The base specifications for MVPN define BGP multicast VPN
"auto-discovery routes", and specify how to use an auto-discovery
route to advertise the fact that an individual customer multicast
flow is being carried in a particular tunnel. However, those
specifications do not provide a way to specify, in a single such
route, that multiple customer flows are being carried in a single
tunnel. Those specifications also do not provide a way to advertise
that a particular tunnel is to be used by default to carry all
customer flows, except in the case where that tunnel is joined by all
the provider edge routers of the MVPN. This document eliminates
these restrictions by specifying the use of "wildcard" elements in
the customer flow identifiers. With wildcard elements, a single
auto-discovery route can refer to multiple customer flows, or even to
all customer flows.
Status of this Memo
This Internet-Draft is submitted to IETF in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Rosen, et al. [Page 1]
Internet Draft draft-ietf-l3vpn-mvpn-wildcards-02.txt February 2012
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
Copyright and License Notice
Copyright (c) 2012 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Rosen, et al. [Page 2]
Internet Draft draft-ietf-l3vpn-mvpn-wildcards-02.txt February 2012
Table of Contents
1 Introduction .......................................... 3
1.1 Terminology ........................................... 3
1.2 Wildcards in S-PMSI A-D Routes ........................ 5
1.3 Use Cases ............................................. 6
2 Encoding of Wildcards ................................. 7
3 Finding the Matching S-PMSI A-D Route ................. 8
3.1 Finding the Match for Data Transmission ............... 9
3.2 Finding the Match for Data Receiving .................. 9
3.2.1 Finding the Match for (C-S,C-G) ....................... 10
3.2.2 Finding the Wildcard Match for (C-*,C-G) .............. 10
4 Procedures for S-PMSI A-D Routes with Wildcards ....... 11
4.1 Procedures for all Kinds of Wildcards ................. 11
4.2 Procedures for (C-*,C-G) S-PMSI A-D Routes ............ 12
4.3 Procedures for (C-S,C-*) S-PMSI A-D routes ............ 13
4.4 Procedures for (C-*,C-*) S-PMSI A-D Routes ............ 14
5 IANA Considerations ................................... 15
6 Security Considerations ............................... 15
7 Acknowledgments ....................................... 16
8 Authors' Addresses .................................... 16
9 Normative References .................................. 17
1. Introduction
1.1. Terminology
This document uses terminology from [MVPN], and in particular uses
the prefixes "C-" and "P-", as specified in section 3.1 of [MVPN], to
distinguish addresses in the "customer address space" from addresses
in the "provider address space". The following terminology and
acronyms are particularly important in this document:
- MVPN
Multicast Virtual Private Network, a VPN [L3VPN] in which
multicast service is offered.
Rosen, et al. [Page 3]
Internet Draft draft-ietf-l3vpn-mvpn-wildcards-02.txt February 2012
- VRF
Virtual Routing and Forwarding table [L3VPN]
- SP
Service Provider
- P-tunnel
A tunnel through the network of one or more SPs.
- C-S
Multicast Source. A multicast source address, in the address
space of a customer network.
- C-G
Multicast Group. A multicast group address (destination
address), in the address space of a customer network.
- C-multicast flow or C-flow
A customer multicast flow. Each C-flow is identified by the
ordered pair (source address, group address), where each address
is in the customer's address space. The identifier of a
particular C-flow is usually written as: (C-S,C-G).
- RP
A "Rendezvous Point", as defined in [PIM].
- C-RP
A rendezvous point whose address is in the customer's address
space.
- Selective P-tunnel
A P-tunnel that is joined only by Provider Edge (PE) routers that
need to receive one or more of the C-flows that are traveling
through that P-tunnel.
- Inclusive P-tunnel
A P-tunnel that is joined by all Provider Edge (PE) routers that
attach to sites of a given MVPN.
Rosen, et al. [Page 4]
Internet Draft draft-ietf-l3vpn-mvpn-wildcards-02.txt February 2012
- S-PMSI A-D route
Selective Provider Multicast Service Interface Auto-Discovery
Route. Carried in BGP Update messages, these routes are used to
advertise the fact that particular C-flows are bound to (i.e.,
are traveling through) particular P-tunnels.
Familiarity with multicast concepts and terminology [PIM] is also
presupposed.
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].
1.2. Wildcards in S-PMSI A-D Routes
As specified in [MVPN] and [MVPN-BGP], an S-PMSI A-D route advertises
that a particular C-flow is bound to a particular selective P-tunnel.
The identifier of the specified C-flow, e.g., (C-S,C-G), is encoded
into the Network Layer Reachability Information (NLRI) of the S-PMSI
A-D route. The identifier of the specified P-tunnel is encoded into
an attribute (the "PMSI Tunnel Attribute") of the S-PMSI A-D route.
Each S-PMSI A-D route thus specifies a single C-flow. To bind
multiple C-flows to a single P-tunnel, it is necessary to advertise
one S-PMSI A-D route for each C-flow, specifying the same P-tunnel in
each such route.
This document defines OPTIONAL extensions to the procedures and
encodings specified in [MVPN] and [MVPN-BGP]. These extensions enable
a single S-PMSI A-D route to advertise that multiple C-multicast
flows are bound to a single P-tunnel.
The extensions specified in this document are based on the notion of
allowing the NLRI of an S-PMSI A-D route to contain a "wildcard". In
the NLRI encoding, a wildcard can replace the C-S, the C-G, or both.
We use the notation "C-*" to denote a wildcard. The extensions allow
the NLRI to encode three kinds of wildcard: (C-*,C-*), (C-S,C-*), and
(C-*,C-G).
By using wildcards, a PE may be able to reduce the number of S-PMSI
A-D routes it originates, thereby improving the scalability of the
control plane. There is, however, no impact on data plane
scalability, as the number of P-tunnels is not reduced.
Encoding and detailed procedures are specified in subsequent sections
of this document.
Rosen, et al. [Page 5]
Internet Draft draft-ietf-l3vpn-mvpn-wildcards-02.txt February 2012
1.3. Use Cases
There are a number of situations in which it can be useful to use
wildcards in the NLRI of an S-PMSI A-D route.
- Using a selective P-tunnel as the default tunnel.
There are procedures in [MVPN] and [MVPN-BGP] that allow a PE to
advertise that it is going to use an inclusive P-tunnel as the
P-tunnel on which it will transmit all C-flows by "default".
However, those documents do not provide any way for a PE to
advertise that it is going to use a selective P-tunnel as the
P-tunnel on which it will transmit all C-flows by "default".
Using the extensions defined in this document, a PE can advertise
that it is going to use a selective P-tunnel as its default
P-tunnel. It does so by advertising an S-PMSI A-D route whose
NLRI contains (C-*,C-*).
- Binding multiple C-flows traveling along a customer's PIM-SM
shared tree to a single P-tunnel.
A PE router may be connected to an MVPN site that contains a
customer RP (C-RP). The C-RP may be the root of one or more
shared trees. In multicast terminology, these are known as (*,G)
trees. By advertising a single S-PMSI A-D route whose NLRI
contains the (C-*,C-G) wildcard, the PE can bind all the C-flows
traveling along customer's (*,G) tree to a single P-tunnel. This
use case applies only when C-G is a non-bidirectional ASM ("Any
Source Multicast") group.
- Binding multiple C-flows with the same C-group address to a
single P-tunnel, even if each such C-flow is traveling along a
customer's PIM source tree.
A PE router may be connected to an MVPN site containing several
multicast sources that are all sending to a common multicast
group, along a customer's PIM source trees. Or the PE may be
connected to several sites, each containing at least one source
sending to the common multicast group. By advertising a single
S-PMSI A-D route whose NLRI contains (C-*,C-G), the PE can bind
these C-flows to a single P-tunnel.
This use case applies only when the C-group is a non-
bidirectional ASM group.
Rosen, et al. [Page 6]
Internet Draft draft-ietf-l3vpn-mvpn-wildcards-02.txt February 2012
- Binding multiple C-flows with the same C-group address to a
single P-tunnel, when those C-flows are traveling along a
customer's BIDIR-PIM shared tree.
This use case applies only when the C-group is a BIDIR-PIM group.
- Binding multiple C-flows from a given C-source to a given
P-tunnel, irrespective of whether those C-flows all have the same
C-group address.
This can be useful when the C-group addresses are SSM ("single
source multicast") addresses. Suppose for example that a given
source transmits multiple "channels" of information, each with
its own C-group address. It may be desirable to bind all these
channels to a single P-tunnel, without having to advertise an
S-PMSI A-D route for each one.
Of course, a specific C-flow, (C-S,C-G), can always be assigned
individually to a particular P-tunnel by advertising an S-PMSI A-D
route whose NLRI contains (C-S,C-G).
In the following, we will sometimes speak of an S-PMSI A-D route
being "ignored". When we say the route is "ignored", we do not mean
that its normal BGP processing is not done, but that the route is not
considered when determining which P-tunnel to use when receiving
multicast data, and that the MPLS label values it conveys are not
used. We will generally use "ignore" in quotes to indicate this
meaning.
This document provides procedures only for the case where the
P-tunnels are "unidirectional", i.e., point-to-multipoint. The use
of "bidirectional" (multipoint-to-multipoint) P-tunnels is outside
the scope of this document.
2. Encoding of Wildcards
Per [MVPN-BGP] section 4.3, the MCAST-VPN NLRI in an S-PMSI A-D route
is encoded as follows:
Rosen, et al. [Page 7]
Internet Draft draft-ietf-l3vpn-mvpn-wildcards-02.txt February 2012
+-----------------------------------+
| RD (8 octets) |
+-----------------------------------+
| Multicast Source Length (1 octet) |
+-----------------------------------+
| Multicast Source (Variable) |
+-----------------------------------+
| Multicast Group Length (1 octet) |
+-----------------------------------+
| Multicast Group (Variable) |
+-----------------------------------+
| Originating Router's IP Addr |
+-----------------------------------+
where the "source length" and "group length" fields always have a
non-zero value. This document specifies that a "zero length" source
or group represents the corresponding wildcard. Specifically:
- A source wildcard is encoded as a zero-length source field. That
is, the "multicast source length" field contains the value 0x00,
and the "multicast source" field is omitted.
- A group wildcard is encoded as a zero-length group field. That
is, the "multicast group length" field contains the value 0x00,
and the "multicast group" field is omitted.
3. Finding the Matching S-PMSI A-D Route
This section gives the precise rules for determining the S-PMSI A-D
route that is "matched" by a given (C-S,C-G) or (C-*,C-G). The
procedures in section 4 will make use of the matching rules defined
in this section.
All matching rules assume the context of a given VRF at a given PE.
The rules that a PE applies to find the S-PMSI A-D route that matches
a (C-S,C-G) C-flow that it needs to transmit are slightly different
than the rules it applies to find the S-PMSI A-D route that matches a
(C-S,C-G) C-flow that it needs to receive. These rules are specified
in sections 3.1 and 3.2 respectively.
The S-PMSI A-D route that is matched by a given (C-S,C-G) may change
over time, as the result of S-PMSI A-D routes being withdrawn, or as
a result of new S-PMSI A-D routes being originated and/or advertised.
In particular, if (C-S,C-G) matches an S-PMSI A-D route whose NLRI
contains (C-*,C-*), the origination or reception of an S-PMSI A-D
Rosen, et al. [Page 8]
Internet Draft draft-ietf-l3vpn-mvpn-wildcards-02.txt February 2012
route whose NLRI contains (C-S,C-G) may cause (C-S,C-G) to match the
latter route instead. Note also that the S-PMSI A-D route that
matches a given (C-S,C-G) is independent of the order in which the
routes were originated or received.
3.1. Finding the Match for Data Transmission
Consider a given PE, call it PE1. At any given time, for a given VRF
at PE1, there is a (possibly empty) set of S-PMSI A-D routes that PE1
has originated and advertised, but not withdrawn. We will refer to
these routes as "currently originated" by PE1. Suppose that PE1
needs to transmit a particular C-flow (C-S,C-G) to one or more other
PEs. We use the following algorithm to find the S-PMSI A-D route
that the C-flow "matches":
- If there is an S-PMSI A-D route currently originated by PE1,
whose NLRI contains (C-S,C-G), the (C-S,C-G) C-flow matches that
route.
- Otherwise, if there is an S-PMSI A-D route currently originated
by PE1, whose NLRI contains (C-S,C-*), AND if C-G is an SSM group
address, the (C-S,C-G) C-flow matches that route.
- Otherwise, if there is an S-PMSI A-D route currently originated
by PE1, whose NLRI contains (C-*,C-G), AND if C-G is an ASM group
address, the (C-S,C-G) C-flow matches that route.
- Otherwise, if there is an S-PMSI A-D route currently originated
by PE1, whose NLRI contains (C-*,C-*), the (C-S,C-G) C-flow
matches that route.
3.2. Finding the Match for Data Receiving
We refer to an S-PMSI A-D route as being "installed" (in a given VRF)
if it has been selected by the BGP decision process as the preferred
route for its NLRI.
An S-PMSI A-D route is considered to be "originated by a given PE" if
that PE's IP address is contained in the "Originating Router's IP
Address" field in the MCAST-VPN NLRI of the route.
Rosen, et al. [Page 9]
Internet Draft draft-ietf-l3vpn-mvpn-wildcards-02.txt February 2012
3.2.1. Finding the Match for (C-S,C-G)
Suppose that a PE router, call it PE1, needs to receive (C-S,C-G),
and that PE1 has chosen another PE router, call it PE2, as the
"upstream PE" [MVPN] for that flow.
- If there is an installed S-PMSI A-D route originated by PE2,
whose NLRI contains (C-S,C-G), then (C-S,C-G) matches that route.
- Otherwise, if there is an installed S-PMSI A-D route originated
by PE2, whose NLRI contains (C-S,C-*), AND if C-G is an SSM
multicast group address, then (C-S,C-G) matches that route.
- Otherwise, if there is an installed S-PMSI A-D route originated
by PE2, whose NLRI contains (C-*,C-G), AND if C-G is an ASM
multicast group address, then (C-S,C-G) matches that route.
- Otherwise, if there is an installed S-PMSI A-D route originated
by PE2, whose NLRI contains (C-*,C-*), then (C-S,C-G) matches
that route.
3.2.2. Finding the Wildcard Match for (C-*,C-G)
Suppose that a PE router, call it PE1, needs to receive (C-*,C-G)
traffic. Note that even if (C-*,C-G) matches a non-wildcard S-PMSI A-
D route (as detailed in section 12.3 of [MVPN-BGP], it may also match
one or more wildcard S-PMSI A-D routes, as specified below.
If on PE1 there is an installed S-PMSI A-D route originated by PE2
whose NLRI contains (C-*,C-G), then (C-*,C-G) matches this route if
one of the following conditions holds:
- PE1 determines that PE2 is the "upstream" PE [MVPN] for C-RP of
C-G, or
- PE1 has installed one or more Source Active A-D routes for C-G
originated by PE2, and for at least one of these routes, PE1 does
not have a corresponding (C-S,C-G) state, or
- C-G is a BIDIR-PIM group, or
- Source Active A-D routes are not being used.
If (C-*,C-G) does not match a (C-*,C-G) S-PMSI A-D route from PE2,
but PE1 has an installed (C-*,C-*) S-PMSI A-D route from PE2, then
(C-*,C-G) matches the (C-*,C-*) route if one of the following
conditions holds:
Rosen, et al. [Page 10]
Internet Draft draft-ietf-l3vpn-mvpn-wildcards-02.txt February 2012
- PE1 determines that PE2 is the "upstream" PE [MVPN] for C-RP of
C-G, or
- PE1 has installed one or more Source Active A-D routes for C-G
originated by PE2, and for at least one of these routes, PE1 does
not have a corresponding (C-S,C-G) state, or
- C-G is a BIDIR-PIM group, or
- Source Active A-D routes are not being used.
4. Procedures for S-PMSI A-D Routes with Wildcards
4.1. Procedures for all Kinds of Wildcards
This document defines procedures for the following uses of the
wildcard in the NLRI of an S-PMSI A-D route:
- (C-*,C-G): Source Wildcard, Group specified.
- (C-S,C-*): Source specified, Group Wildcard.
- (C-*,C-*): Source Wildcard, Group Wildcard.
All other wildcard functionality is outside the scope of this
document.
The ability to originate S-PMSI A-D routes with a particular kind of
wild card is OPTIONAL. However, if a PE has the ability to originate
S-PMSI A-D routes with a particular kind of wildcard, it MUST have
the ability to interpret and correctly process S-PMSI A-D routes with
that kind of wildcard, and it SHOULD have the ability to interpret
and correctly process all three kinds of wildcard.
For a given MVPN, A PE MUST NOT originate S-PMSI A-D routes with a
particular kind of wildcard unless it is known a priori that all PEs
attached to that MVPN have the ability to interpret and correctly
process that kind of wildcard.
The criteria for originating and withdrawing S-PMSI A-D routes with
wildcards are local to the originating PE.
As specified in [MVPN-BGP], an S-PMSI A-D route is carried in the
Network Layer Reachability Information (NLRI) field of an
MP_REACH_NLRI attribute (see [BGP-MP]). Every S-PMSI A-D route has a
particular address family (IPv4 or IPv6), as specified in the Address
Rosen, et al. [Page 11]
Internet Draft draft-ietf-l3vpn-mvpn-wildcards-02.txt February 2012
Family Information AFI field of the MP_REACH_NLRI attribute. A
wildcard in a particular S-PMSI A-D route always refers only to
multicast flows of that same address family.
The procedures specified in this document apply only when the PMSI
Tunnel Attribute of an S-PMSI A-D route specifies a "unidirectional"
P-tunnel. The use of "bidirectional" P-tunnels (e.g., Multipoint-to-
Multipoint Label Switched Paths, BIDIR-PIM trees) is outside the
scope of this document.
In the following sections, an S-PMSI A-D route whose NLRI contains
(C-*,C-G), (C-S,C-*), or (C-*,C-*) will be referred to as a
"(C-*,C-G) route", a "(C-S,C-*) route", or a "(C-*,C-*)" route,
respectively.
4.2. Procedures for (C-*,C-G) S-PMSI A-D Routes
This document specifies the use of (C-*,C-G) S-PMSI A-D routes only
in the case where C-G is an ASM group address. Use of (C-*,C-G)
S-PMSI A-D routes where C-G is an SSM group address is outside the
scope of this document. If a PE receives a (C-*,C-G) S-PMSI A-D
route, and the PE can determine that C-G is an SSM group address, the
PE SHOULD "ignore" this S-PMSI A-D route.
By default, the set of Route Targets carried by a (C-*,C-G) S-PMSI A-
D route originated by a given VRF is the same as the set of Route
Targets carried in the (unicast) VPN-IP routes that originated from
that VRF. An implementation MUST allow the set of Route Targets
carried by the (C-*,C-G) S-PMSI A-D route to be specified by
configuration. In the absence of a configured set of Route Targets,
the route MUST carry the default set of Route Targets.
If a PE needs to transmit packets of a (C-S,C-G) C-flow, and if
(C-S,C-G) matches an (C-*,C-G) S-PMSI A-D route according to the
rules of section 3.1, then the PE MUST use the P-tunnel advertised in
this route for transmitting that C-flow. (Note that it is impossible
for a given (C-S,C-G) to match both a (C-*,C-G) wildcard and a
(C-S,C-*) wildcard.)
If PIM is being used as the PE-PE control protocol, then if the PE
has (C-*,C-G) and/or (C-S,C-G) state that matches (according to the
procedures of section 3.2) an S-PMSI A-D route, the PE MUST join the
P-tunnel specified in the PMSI Tunnel Attribute of this route.
If BGP is being used as the PE-PE control protocol, then:
Rosen, et al. [Page 12]
Internet Draft draft-ietf-l3vpn-mvpn-wildcards-02.txt February 2012
- If a given PE has currently originated a C-multicast Shared Tree
Join for (C-*,C-G), and if (C-*,C-G) matches a (C-*,C-G) S-PMSI
A-D route, then the PE applies the procedures of section 12.3
("Receiving S-PMSI A-D routes by PEs") of [MVPN-BGP] to that
S-PMSI A-D route.
- Otherwise (the given PE does not have a currently originated
C-multicast Shared Tree Join for (C-*,C-G)), if there are one or
more values of C-S for which the PE has a currently originated
Source Tree Join C-multicast route for (C-S,C-G), the PE MUST
join the tunnels advertised by the S-PMSI A-D routes that match
(according to section 3.2) each such (C-S,C-G).
- Otherwise the PE "ignores" the route.
4.3. Procedures for (C-S,C-*) S-PMSI A-D routes
This document covers the use of (C-S,C-*) S-PMSI A-D routes for only
the C-multicast flows where C-G is an SSM group address. Use of
(C-S,C-*) S-PMSI A-D routes for other C-multicast flows is outside
the scope of this document. Specifically, if a PE receives a
(C-S,C-*) S-PMSI A-D route, and the PE can determine that C-G is not
an SSM group address, the PE SHOULD "ignore" this S-PMSI A-D route.
By default the set of Route Targets carried by a (C-S,C-*) S-PMSI A-D
route originated by a given VRF is an intersection between the set of
Route Targets carried in the Intra-AS I-PMSI A-D route that
originated from that VRF, and the set of Route Targets carried by the
unicast VPN-IP route to C-S originated from that VRF. An
implementation MUST allow the set of Route Targets carried by the
(C-S,C-*) S-PMSI A-D route to be specified by configuration. In the
absence of a configured set of Route Targets, the route MUST carry
the default set of Route Targets.
If a PE needs to transmit packets of a (C-S,C-G) C-flow, and if
(C-S,C-G) matches a (C-S,C-*) S-PMSI A-D route according to the rules
of section 3.1, then the PE MUST use the P-tunnel advertised in this
route for transmitting that C-flow. (Note that it is impossible for
a given (C-S,C-G) to match both a (C-*,C-G) wildcard and a (C-S,C-*)
wildcard.)
If PIM is being used as the PE-PE control protocol for distributing
C-multicast routing, and if a given PE, needs to receive a (C-S,C-G)
flow, and if (C-S,C-G) matches the (C-S,C-*) S-PMSI A-D route
(according to the procedures of section 3.2), then the PE MUST join
the P-tunnel specified in the PMSI Tunnel Attribute of that route.
Rosen, et al. [Page 13]
Internet Draft draft-ietf-l3vpn-mvpn-wildcards-02.txt February 2012
If BGP is being used as the PE-PE control protocol for distributing
C-multicast routing, and if there is some (C-S,C-G) such that (a) the
PE has a currently originated (C-S,C-G) Source Tree Join C-multicast
route, AND (b) the given (C-S,C-G) matches (according to the
procedures of section 3.2) a (C-S,C-*) S-PMSI A-D route, then PE1
applies the procedures of section 12.3 ("Receiving S-PMSI A-D routes
by PEs") of [MVPN-BGP] to the matching S-PMSI A-D route.
4.4. Procedures for (C-*,C-*) S-PMSI A-D Routes
(C-*,C-*) S-PMSI A-D routes are used when, for a given MVPN, a PE has
a policy not to use an I-PMSI for carrying multicast data traffic
originated in the MVPN's site(s) connected to that PE. When the
(C-*,C-*) wildcard is used together with BGP C-multicast routing,
this results in the "S-PMSI only" model, where no I-PMSIs are used at
all for the given MVPN.
A (C-*,C-*) S-PMSI A-D route is originated for a given MVPN by a
given PE only if that PE has been provisioned with the policy to do
so.
When so provisioned, the PE MAY originate the (C-*,C-*) S-PMSI A-D
route as soon as it is enabled to support the given MVPN.
Alternatively, the PE MAY delay originating the route until one of
the following conditions holds:
- The PE-PE protocol for distributing C-multicast routing is PIM,
and for the given MVPN, the PE has some (C-S,C-G) or (C-*,C-G)
state for which the upstream interface is one of the VRF
interfaces for the given MVPN.
- The PE-PE protocol for distributing C-multicast routing is BGP,
and the given PE has received and installed either:
* a Source Tree Join C-multicast route, with the C-S contained
in the route's NLRI being reachable via one of the given
MVPN's VRF interfaces, or
* a Shared Tree Join C-multicast route, with the C-RP carried
in that route being reachable via one of the given MVPN's VRF
interfaces.
By default, the set of Route Targets carried by a (C-*,C-*) S-PMSI
A-D route originated from a given VRF is the same as the set of Route
Targets carried in the VPN-IP unicast routes originated from that
VRF. An implementation MUST allow the set of Route Targets carried by
the (C-*,C-*) S-PMSI A-D route to be specified by configuration. In
Rosen, et al. [Page 14]
Internet Draft draft-ietf-l3vpn-mvpn-wildcards-02.txt February 2012
the absence of a configured set of Route Targets, the route MUST
carry the default set of Route Targets, as specified above.
If a PE needs to transmit packets of a (C-S,C-G) C-flow, and if
(C-S,C-G) matches a (C-*,C-*) S-PMSI A-D route according to the rules
of section 3.1, then the PE MUST use the P-tunnel advertised in this
route for transmitting that C-flow. (Note that it is impossible for
a given (C-S,C-G) to match both a (C-*,C-*) wildcard and any other
wildcard.)
If PIM is being used as the PE-PE control protocol for distributing
C-multicast routing, and if a given PE, say PE1, needs to receive a
(C-S,C-G) flow, and if (C-S,C-G) matches the (C-*,C-*) S-PMSI A-D
route (according to the procedures of section 3.2), then PE1 MUST
join the P-tunnel specified in the PMSI Tunnel Attribute of that
route.
If BGP is being used as the PE-PE control protocol for distributing
C-multicast routing, then if (and only if) one of the following
conditions holds, the PE applies the procedures of section 12.3
("Receiving S-PMSI A-D routes by PEs") of [MVPN-BGP] to the matching
S-PMSI A-D route. The conditions are:
- The PE has a currently originated C-multicast Source Tree Join
route for (C-S,C-G) that matches (according to the procedures of
section 3.2) the (C-*,C-*) S-PMSI A-D route, or
- The PE has a currently originated a C-multicast Shared Tree Join
route for (C-*,C-G) that matches (according to the procedures of
section 3.2) the (C-*,C-*) S-PMSI A-D route.
5. IANA Considerations
This document requires no actions of IANA.
6. Security Considerations
There are no additional security considerations beyond those of
[MVPN] and [MVPN-BGP].
Rosen, et al. [Page 15]
Internet Draft draft-ietf-l3vpn-mvpn-wildcards-02.txt February 2012
7. Acknowledgments
The authors wish to thank Arjen Boers, Dongling Duan, Apoorva Karan,
Thomas Morin, Keyur Patel, Karthik Subramanian, and Kurt Windisch for
many helpful discussions.
8. Authors' Addresses
Rahul Aggarwal
Juniper Networks
1194 North Mathilda Ave.
Sunnyvale, CA 94089
Email: raggarwa_1@yahoo.com
Yiqun Cai
Cisco Systems, Inc.
170 Tasman Drive
San Jose, CA, 95134
E-mail: ycai@cisco.com
Wim Henderickx
Alcatel-Lucent
e-mail: wim.henderickx@alcatel-lucent.be
Praveen Muley
Alcatel-Lucent
e-mail: Praveen.Muley@alcatel-lucent.com
Ray (Lei) Qiu
2330 Central Expressway
Santa Clara, CA 95050
USA
e-mail: rayq@huawei.com
Rosen, et al. [Page 16]
Internet Draft draft-ietf-l3vpn-mvpn-wildcards-02.txt February 2012
Yakov Rekhter
Juniper Networks
1194 North Mathilda Ave.
Sunnyvale, CA 94089
Email: yakov@juniper.net
Eric C. Rosen
Cisco Systems, Inc.
1414 Massachusetts Avenue
Boxborough, MA, 01719
E-mail: erosen@cisco.com
IJsbrand Wijnands
Cisco Systems, Inc.
De kleetlaan 6a Diegem 1831
Belgium
E-mail: ice@cisco.com
9. Normative References
[BGP-MP] "Multiprotocol Extensions for BGP-4", T. Bates, R. Chandra,
D. Katz, Y. Rekhter, RFC 4760, January 2007
[L3VPN] "BGP/MPLS IP Virtual Private Networks", E. Rosen, Y. Rekhter,
RFC 4364, February 2006
[MVPN] "Multicast in MPLS/BGP IP VPNs", Rosen, Aggarwal, et. al., RFC
6513, February 2012
[MVPN-BGP] "BGP Encodings and Procedures for Multicast in MPLS/BGP IP
VPNs", Aggarwal, Rosen, Morin, Rekhter, Kodeboniya, RFC 6514,
February 2012
[PIM] "Protocol Independent Multicast - Sparse Mode (PIM-SM):
Protocol Specification (Revised)", Fenner, Handley, Holbrook,
Kouvelas, RFC 4601, August 2006
[RFC2119] "Key words for use in RFCs to Indicate Requirement
Levels.", Bradner, March 1997
Rosen, et al. [Page 17]
Internet Draft draft-ietf-l3vpn-mvpn-wildcards-02.txt February 2012
Rosen, et al. [Page 18]